Dec 19, 2016
Posted in Featured, Information Security, mobile, portfolio, Tutorial
Mobile Hardening
A question I often get asked by a lot of mobile users is regarding how they can secure “harden” their mobile devices. What can they do to add some layers of protection to secure their mobile devices?
There aren’t a whole lot of software tools that are out there which actually harden mobile devices. And, it’s a bit unfortunate that mobile security has a lower priority these days.
Kaspersky Threats 2015
Courtesy of (https://www.kaspersky.com)
For most Android and iOS devices there are a few steps and actions that you can take in order to harden your mobile device.
The following steps should give you some basic hardening techniques for personal use.
(more…)
Sep 22, 2016
Posted in Encryption, Featured, Information Security, Linux, mobile, portfolio
Mobile Devices
Today is more of a Throwback Thursday moment that I’d like to share with everyone regarding mobile devices.
So in 2015 in order to Graduate from the B.tech Forensics – Computer Crime program.
We had a year long research project that was conducted by each student.
My focus was on Mobile forensics and particularly on Android devices.
This was a field that was slightly newer to me, but I felt mobile security will play a huge role in the future. We use our mobile devices for just about everything, and this means future cyber attacks will start to hit mobile devices.
Also, at the same time, I was very curious as to what type of information mobile devices hold and contain about us. I hope my research brings out some answers for many people while at the same time posing further questions to explore.
I’ve decided to attach a PDF of my Android Forensics project.
(more…)